Tag: The Internet

4chan anonymous copyright counterculture culture democracy digital digital america digital culture digital divide Education Facebook Google Government hackers hacking Information Please Innovation internet IPhone Julian Assange Mark Poster Mexico Netizen new media NSA Obama Occupy Online Activism politics Privacy snowden social awareness social media SOPA Stuxnet Tec de Monterrey technology Ted Talks Turkle Twitter USA WikiLeaks wired youtube

Democracy and Sharks!

// Posted by on 06/04/2015 (3:32 PM)


What the readings this week left me with is this:

  1. Clearly, we’re trying to move money and move it fast. These processes help make more money. It might be legal, it might not be, and some

Read more



What the readings this week left me with is this:

  1. Clearly, we’re trying to move money and move it fast. These processes help make more money. It might be legal, it might not be, and some people have developed algorithms to manipulate it. Pretty simple, well, not really, but you know what I mean.
  2. More importantly, I think, access to the internet and all things digital and fast does not necessarily build or promote democracy.


 The Internet is designed for collaboration and the promotion of ideas. As long as people are able to access the Internet, they will have a greater possibility of locating like-minded people. When like-minded people collaborate, they develop new ideas and they begin to question things. If they can’t find a logical answer they begin to question those that made the decision, ruling, law, etc. in the first place. If those decision-makers won’t make change, then that group of like-minded people will organize and work to force change. Decision-makers and leaders don’t like this. It puts their power at risk. It calls their authority into question. The Internet definitely gives power to the general public. Power to the people!


The ability to organize and make change is power and the Internet is absolutely a tool for this to happen. The ability to then force our leaders to make change, and if they don’t we vote them out of office, that’s power.

But wait!

The Electronic Frontier Foundation made note that Venezuelans working with several different ISPs lost all connectivity on Thursday of this past week. Users lost connectivity to the major content delivery network Edgecast and the IP address which provides access to Twitter’s image hosting service while another block stopped Venezuelan access to the text-based site Pastebin.

Meanwhile the New York Times reports that the news network NTN24 has been shut down as well. The alternative news channel Telesur, run by the Venezuelan government, is still up and running.

NTN24 has been shut down, according to the president of Venezuela, due to their attempt to “torment anxiety about a coup d’etat.  The President Maduro went on to suggest that “no one is going to come from abroad and try to perturb  the psychological climate of Venezuela.” NTN24 was removed on Wednesday of this past week. (“Venezuelan government shuts down internet in wake of protests“)

The government, big business, and many other powerful and authoritative entities have the same access, if not more, to the Internet as that group of like-minded people that rose up for change. Basically, if they didn’t like that the aforementioned group organized and questioned their power, they have the power to take it away. If there’s no internet, people can’t share ideas, ask questions, or continue to organize. They could target individuals, spy on them, steal their identities, or even make it so their cats no longer recognize them.

The Internet empowers everyone who has access, but don’t use your access to do anything questioning those that gave you access. They’ve been empowered too, and odds are they have even more power and even more internet. David Golumbia states in his article, “High-frequency trading: networks of wealth and the concentration of power,” that “many of the most powerful actors in our world show absolutely no signs of being afraid  of losing their grip on power due to computerization.” This isn’t a redistribution of access or power, but rather the already powerful are sharing just a tiny bit – just enough to keep from asking questions. The powerful have tried to oppress print and television in the same way – either by shutting it down altogether, or by entirely dictating what those mediums are allowed to present to the public.

So no, the Internet is not democratic. It’s a tool that we’ve been given to use, and if we don’t use it right it will be used against us. Golumbia says that “people themselves must reassert their right and their responsibility to govern and operate the parts of society that are and should be democratized.”

Oh! I almost forgot!

3. Sharks! I can’t forget the sharks. It’s crazy to think that these companies are pouring all of this money into establishing this infrastructure only to have the sharks come and play with it. It’s like a squirrel biting a power line. Is it possible to mask this electromagnetic field? I don’t know enough about this stuff to speculate. If sharks get angry at humans and decide to take out the internet, or any of the other fiber optic cables running along the ocean floor, we’re in the dark and they’ll have ample time to devise their takeover. This is power! It seems that access to the internet and the expansion of digital technology really does empower anything and everyone.

Today’s lesson: don’t piss off the sharks.


Categories: Uncategorized
Tags: , , , , , ,

The Cyberwar is Coming

// Posted by on 05/28/2015 (4:20 PM)


I found the articles we read for this assignment to be particularly fascinating and thought-provoking. In all of my climate-related classes, research, and study, water and water resources are often cited as the likely catalysts for… Read more



I found the articles we read for this assignment to be particularly fascinating and thought-provoking. In all of my climate-related classes, research, and study, water and water resources are often cited as the likely catalysts for the next great wars, and their arguments are all terribly logical and believable. The experts all say that we’re starting to see signs of this now. For example, “last summer, Isis accused the Turkish government in Ankara, headed by Recep Tayyip Erdogan, of deliberately holding back the Euphrates through a series of dams on its territory, lowering water levels in Lake Assad by a record six metres. Isis was apoplectic.”

However, after reading “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History,” I really started thinking that maybe wars over water will be undermined by directed malware wars. With Stuxnet, as noted in “The Code War,” the way it worked was “not unlike the enriched uranium the Iranians were working on, but in software form: expensive, highly refined munitions that formed the core of an extremely sophisticated weapons system.”

Attacks like these could very well lead to the next great wars. They are “unobtrusive, can be constant, and they’re invasive. “As the reading shows, these attacks have already started. If Iran had retaliated, or retaliates, what will it look like? Developers designed malware with the ability to tap into Iran’s nuclear centrifuges and alter the speed at which they work. What’s keeping someone or a government from exploiting that ability to an apocalyptic end? Why not? If we can, we should, right? If malware this mischievous can be created and unleashed it in the name of data gathering, sabotage, spying, whatever – and something goes wrong, what kind of collateral damage will there be? As we read, with Stuxnet, there were some friendly fire (assuming that there were some infections in the country(ies) responsible for the attack) accidents. Computers worldwide were infected – even some in the US. “The victims bleed personal data and intellectual property.”

What sectors in the US have unique vulnerabilities like the one exploited in Iran? Likely a lot! Everything is automated these days. Everything is a computer or has a computer. Even the business card dropped off by a bulk water sales rep today had a computer in it.

The image doesn’t do it justice, so here:

Could Diamond Springs unleash malware into this guy’s business card and sabotage his operation? It has a USB port. This item likely has a variety of weaknesses.

Additionally, should the U.S. be using these methods for domestic data gathering? Whether or not they should be, they do. In the example laid out in “The Code War,” with Freedom Hosting, they acquired a warrant and implanted surveillance software.  In doing so, broke up a huge child pornography operation. This is good. However, if the FBI, CIA, NSA, ABCDEFG want to do the same to my computer because I visited a site of an organization critical of the American government, is that right? No. To answer my above question, no, just because we can doesn’t mean we should. These attacks aren’t going anywhere. In fact, Edward Snowden reveled that “the NSA budget included $25.1 million for “additional covert purchases of software vulnerabilities,” suggesting that they both buy zero-days and roll out their own internally.”

Categories: Uncategorized
Tags: , , , , , , , , ,